storj.io/minio@v0.0.0-20230509071714-0cbc90f649b1/cmd/config/identity/openid/validators_test.go (about) 1 /* 2 * MinIO Cloud Storage, (C) 2018 MinIO, Inc. 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 package openid 18 19 import ( 20 "net/http" 21 "net/http/httptest" 22 "testing" 23 24 xnet "storj.io/minio/pkg/net" 25 ) 26 27 type errorValidator struct{} 28 29 func (e errorValidator) Validate(token, dsecs string) (map[string]interface{}, error) { 30 return nil, ErrTokenExpired 31 } 32 33 func (e errorValidator) ID() ID { 34 return "err" 35 } 36 37 func TestValidators(t *testing.T) { 38 ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { 39 w.Header().Set("content-type", "application/json") 40 w.Write([]byte(`{ 41 "keys" : [ { 42 "kty" : "RSA", 43 "kid" : "1438289820780", 44 "use" : "sig", 45 "alg" : "RS256", 46 "n" : "idWPro_QiAFOdMsJD163lcDIPogOwXogRo3Pct2MMyeE2GAGqV20Sc8QUbuLDfPl-7Hi9IfFOz--JY6QL5l92eV-GJXkTmidUEooZxIZSp3ghRxLCqlyHeF5LuuM5LPRFDeF4YWFQT_D2eNo_w95g6qYSeOwOwGIfaHa2RMPcQAiM6LX4ot-Z7Po9z0_3ztFa02m3xejEFr2rLRqhFl3FZJaNnwTUk6an6XYsunxMk3Ya3lRaKJReeXeFtfTpShgtPiAl7lIfLJH9h26h2OAlww531DpxHSm1gKXn6bjB0NTC55vJKft4wXoc_0xKZhnWmjQE8d9xE8e1Z3Ll1LYbw", 47 "e" : "AQAB" 48 }, { 49 "kty" : "RSA", 50 "kid" : "1438289856256", 51 "use" : "sig", 52 "alg" : "RS256", 53 "n" : "zo5cKcbFECeiH8eGx2D-DsFSpjSKbTVlXD6uL5JAy9rYIv7eYEP6vrKeX-x1z70yEdvgk9xbf9alc8siDfAz3rLCknqlqL7XGVAQL0ZP63UceDmD60LHOzMrx4eR6p49B3rxFfjvX2SWSV3-1H6XNyLk_ALbG6bGCFGuWBQzPJB4LMKCrOFq-6jtRKOKWBXYgkYkaYs5dG-3e2ULbq-y2RdgxYh464y_-MuxDQfvUgP787XKfcXP_XjJZvyuOEANjVyJYZSOyhHUlSGJapQ8ztHdF-swsnf7YkePJ2eR9fynWV2ZoMaXOdidgZtGTa4R1Z4BgH2C0hKJiqRy9fB7Gw", 54 "e" : "AQAB" 55 } ] 56 } 57 `)) 58 w.(http.Flusher).Flush() 59 })) 60 defer ts.Close() 61 62 vrs := NewValidators() 63 64 if err := vrs.Add(&errorValidator{}); err != nil { 65 t.Fatal(err) 66 } 67 68 if err := vrs.Add(&errorValidator{}); err == nil { 69 t.Fatal("Unexpected should return error for double inserts") 70 } 71 72 if _, err := vrs.Get("unknown"); err == nil { 73 t.Fatal("Unexpected should return error for unknown validators") 74 } 75 76 v, err := vrs.Get("err") 77 if err != nil { 78 t.Fatal(err) 79 } 80 81 if _, err = v.Validate("", ""); err != ErrTokenExpired { 82 t.Fatalf("Expected error %s, got %s", ErrTokenExpired, err) 83 } 84 85 vids := vrs.List() 86 if len(vids) == 0 || len(vids) > 1 { 87 t.Fatalf("Unexpected number of vids %v", vids) 88 } 89 90 u, err := xnet.ParseHTTPURL(ts.URL) 91 if err != nil { 92 t.Fatal(err) 93 } 94 95 cfg := Config{} 96 cfg.JWKS.URL = u 97 if err = vrs.Add(NewJWT(cfg)); err != nil { 98 t.Fatal(err) 99 } 100 101 if _, err = vrs.Get("jwt"); err != nil { 102 t.Fatal(err) 103 } 104 }